CS8792 CNS QBank PIT
CS8792 CNS QBank PIT
CS8792 CNS QBank PIT
300 3
OBJECTIVES:
• To understand Cryptography Theories, Algorithms and Systems.
• To understand necessary Approaches and Techniques to build protection
mechanisms in order to secure computer networks.
UNIT I INTRODUCTION
Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at
Multiple levels, Security Policies – Model of network security – Security attacks, services
and mechanisms – OSI security architecture – Classical encryption techniques: substitution
techniques, transposition techniques, steganography- Foundations of modern cryptography:
perfect security – information theory – product cryptosystem – cryptanalysis.
TEXT BOOK:
1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI
3rd Edition, 2006.
REFERENCES:
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE
Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2
PART-A
16. Differentiate active and passive attacks. (AN) (April / May 2019)
Basis for Active Attack Passive Attack
Comparison
Basic Active attack tries to change Passive attack tries to read or make use of
the system resources or affect information from the system but does not
their operation. influence system resources.
Modification in Occurs does not take place
the information
Harm to the Always causes damage to the Do not cause any harm.
system system.
Threat to Integrity and availability Confidentiality
Attack awareness The entity (victim) gets The entity is unaware of the attack.
informed about the attack.
Task performed The transmission is captured Just need to observe the transmission.
by the attacker by physically controlling the
portion of a link.
Emphasis is on Detection Prevention
➢ Shift Ciphers.
➢ Affine Ciphers
➢ Vigenere Cipher
➢ Substitution Ciphers
➢ Sherlock Holmes
Nonrepudiation:
This service helps to prove that the person who denies the transaction is true or false.
Authentication:
It helps to prove that the source entity only has involved the transaction.
➢ Fabrication
27. Give an example each for substitution and transposition ciphers. ( Nov/Dec 2013)
The example of substitution Cipher is Caesar Cipher.The example of transposition Cipher is Reil Fence
Cipher.
28. Differentiate unconditionally secured and computationally secured. (AN)
An Encryption Algorithm is unconditionally secured means that the condition is if the cipher
text generated by the encryption scheme doesn’t contain enough information to determine
corresponding plaintext.
Encryption is computationally secured means,
1. The cost of breaking the cipher exceed the value of enough information.
2. Time required to break the cipher exceed the useful lifetime of information.
34. Why is asymmetric cryptography bad for huge data? Specify the reason.
(U) (April/May 2018)
There are two main reasons why asymmetric cryptography is practically never used to directly
encrypt significant amount of data:
1) Size of cryptogram
2) Performance
35. Calculate the cipher test for the following using one time pad cipher. (A) (Nov/Dec 2018)
Plain Text: ROCK Keyword: BOTS
• Repeating plaintext letters that are in the same pair are separated with a filler letter
• Two plaintext letters that fall in the same row of the matrix are each replaced by the
letter to the right, with the first element of the row circularly following the last
• Two plaintext letters that fall in the same column are each replaced by the letter
beneath, with the top element of the column circularly following the last.
38. Convert the given text “Anna University” into cipher text using rail fence technique.
(May/June 2013)
Using rail fence of depth 2 we can write as following:
AnUiest
nanvriy
the encrypted cipher text is AnUiestnanvriy
44. What is the difference between differential and linear cryptanalysis? (A)
In differential cryptanalysis, it breaks the DES in less 255 complexities. In cryptanalysis, it
finds the DES key given 247 plaintexts.
PART-B
1. What are the different types of attacks? Explain. (8) (U) (Dec - 2013)
2. Explain the OSI security architecture along with the services available. (R) (Nov/Dec 2009)
3. (i) Explain OSI Security Architecture model with neat diagram.(8) (R)
(ii) Describe the various security mechanisms. (8)(U) (Nov/Dec 2016)
4. Explain the network security model and its important parameters with a neat block diagram.
(April/May 2019)
5. Explain briefly on Legal, Ethical and Professional aspects of security.
6. Discuss any four substitution cipher encryption methods and list their merits and demerits. (U)
(May/June 2008) (May/June 2014)(April/May 2016)
7. Explain any all types of cipher techniques in detail. (U) (June 2012) (Dec 2012)
8. Discuss the classical cryptosystem and its types. (U) (May 2011) (June 2013)
9. Explain the play fair cipher with an example. (U) (Nov/Dec 2009)
10. Solve using playfair cipher method. Encrypt the word “Semester Result” with the keyword
“Examination”. Discuss the rules to be followed. (A) (April/May 2019)
11. Explain placement of encryption function. (U)
12. Discuss briefly about traffic confidentiality. (U)
13. Perform Encryption and Decryption using Hill Cipher for the following Message: PEN and
Key: ACTIVATED (A) (Nov/Dec 2018)
14. Explain classical encryption techniques with symmetric cipher and Hill cipher model. (U)
(April/May 2018)
15. (i) Whatis steganography? Describe the various techniques used in steganography. (7)
(ii) What is monoalphabetic cipher? Examine how it differs from Caesar cipher. (6)
(April/May 2019)
16. Describe (U) (April/May 2017)
i. Play Fair Cipher
ii. Railfence Cipher
iii. Vignere Cipher
Encrypt the following using play fair cipher using the keyword MONARCHY.”SWARAJ IS
MY BIRTH RIGHT”. Use X for blank spaces. (A) (Nov/Dec 2017)
17. Briefly explain on foundation for the modern cryptography
18. How to obtain perfect security? Explain with an example.
PART A
3. Find gcd (1970, 1066) using Euclid's algorithm. (A) (Nov/Dec 2016)
Euclid’s Algorithm to find gcd(a,b):
• A=a, B=b
• while B>0
• R = A mod B
• A = B, B = R
• return A
Therefore, gcd(1970, 1066) = gcd(1066, 1970 mod 1066) = gcd(1066, 904) = 904.
Step 1. Divide the larger number by the smaller one:24,140 ÷ 16,762 = 1 + 7,378;
Step 2. Divide the smaller number by the above operation's remainder:16,762 ÷ 7,378 = 2 +
2,006;
Step 3. Divide the remainder from the step 1 by the remainder from the step 2:7,378 ÷ 2,006 =
3 + 1,360;
Step 4. Divide the remainder from the step 2 by the remainder from the step 3:2,006 ÷ 1,360 =
1 + 646; Step 5. Divide the remainder from the step 3 by the remainder from the step 4:1,360
÷ 646 = 2 + 68; Step 6. Divide the remainder from the step 4 by the remainder from the step
5:646 ÷ 68 = 9 + 34;
Step 7. Divide the remainder from the step 5 by the remainder from the step 6:68 ÷ 34 = 2 + 0;
At this step, the remainder is zero, so we stop:
34 is the number we were looking for, the last remainder that is not zero.
This is the greatest common factor (divisor).
Greatest (highest) common factor (divisor)
gcf, gcd (24,140; 16,762) = 34 = 2 × 17;
5. Write short notes Congruence. (R)
Let a, b, n be integers with n≠0. We say that a ≡ b (mod n), if a-b is a multiple of n.
8. Write short notes Fermat’s Little Theorem. (R) (April/May 2017, Nov/Dec 2017)
If p is a prime and p does not divide a, then ap-1 ≡ 1 (mod p)
14.Define Rings
A RING is a set R which is CLOSED under two operations + and × and satisfying the following
properties:
(1) R is an abelian group under +.
(2) Associativity of × – For every a, b, c ∈ R, a × (b × c) = (a × b) × c
(3) Distributive Properties – For every a, b, c ∈ R the following identities hold: a × (b + c) = (a × b) +
(a × c) and (b + c) × a = b × a + c × a.
24. What are the design parameters of Feistel cipher network? (R)
➢ Block size
➢ Key size
➢ Number of Rounds
➢ Subkey generation algorithm
➢ Round function
➢ Fast software Encryption/Decryption
➢ Ease of analysis
31. What was the final set of criteria used by NIST to evaluate candidate AES ciphers? (R)
The final set of criteria used by NIST to evaluate candidate AES ciphers are:
➢ General Security
➢ Software Implementations
➢ Restricted-Space Environments
➢ Hardware Implementations
➢ Attacks On Implementations
➢ Encryption vs. Decryption
➢ Key Agility
➢ Other Versatility and Flexibility
➢ Potential for Instruction-Level Parallelism
37. How many bytes in State are affected by Shift Rows? (R)
Totally 6-bytes in state are affected by Shift Rows.
41. What is the difference between Sub Bytes and Sub Word? (AN)
Sub Bytes:
Sub Bytes uses an S-box to perform a byte-by-byte substitution of the block.
Sub Word:
42. What is the difference between Shift Rows and Rot Word? (AN)
Shift Rows: Shift Row is simple permutation. It shifts the rows circularly left or right.
Rot Word: Rot word performs a one-byte circular left shift on a word. This means that an input
word [b0,b1,b2,b3] is transformed into [b1,b2,b3,b0].
43.Why do some block cipher modes of operation only use encryption while others use both
encryption and decryption? (AN)
Some block cipher modes of operation only use encryption because the input is set to some
initialization vector and the leftmost bits of the output of the encryption function are ‘XOR’ed with the
first segment of plain text p1 to produce the first unit of cipher text C1 and it is transmitted. While in
decryption, the cipher text is XORed with the output of the encryption function to produce the plain
text.
48. List the parameters (block size, key size, number of rounds)for three AES versions. (R)
(April/May 2018)
51. What are the different modes of operation of DES? (April/May 2011)
In DES there are four modes of operation, the modes specify how data will be encrypted
(cryptographically protected) and decrypted (returned to original form). The modes are the Electronic
Codebook (ECB) mode, the CipherBlock Chaining (CBC) mode, the Cipher Feedback (CFB) mode,
and the Output Feedback (OFB) mode.
55. What are the common mathematical constants used in RC5? (R)
W :Word size in bits. RC5 encrypts 2-word blocks. 16, 32,64 r: Number of rounds. 0,1,….,255
B Number of 8-bit bytes (octets) in the secret key K. 0,1,….,255
57. List the important design considerations for a stream cipher. (R)
The encryption sequence should have a large period. The key stream should approximate the
properties of a true random number stream as close as possible. The output of the pseudorandom
number generator is conditioned on the value of the input key.
60. What are the primitive operations used in RC5? (R) (April/May 2019)
RC5 uses three primitive operations (and their inverse):
• Addition: Addition of words, denoted by +, is performed modulo 2w. The inverse operation,
PART-B
1. Solve gcd(98,56) using Extended Euclidean Algorithm. Write the algorithm also. (A)
(Nov/Dec 2018)
2. Discuss the properties that are to be satisfied by Groups, Rings and Fields. (U)
(Nov/Dec 2017)
3. Discuss in detail the different ways of distribution of public keys. (U) (Nov/Dec 2007)
4. Describe the block cipher modes of operation in detail. (U)
5. With a neat structure of classical Feistel network, indicate the parameters and design features which
are essential for the exact realization of the network. (U) (May/June 2007)
6. Discuss the block cipher modes of operation and give the advantages and disadvantages. (U)
(May/June 2009, May/June 2010)
7. Explain AES algorithm with all its round functions in detail. (16) (U) (Nov/Dec 2016)
(April/May 2018)
8. Explain in detail the transformation takes place in AES encryption procedure. (E)
(Nov/Dec 2009)
9. Discuss about AES Cipher. (U) (May/June 2010)
10. (i) Describe in detail the key generation in AES algorithm and its expansion format. (7) (U)
(ii) Describe DSE and its applications. (6) (U) (April/May 2019)
11. Explain in detail about DES. (U) (June 2013) (Dec 2012) (April / May 2016)
(April / May 2017)
12. Explain about the single round DES algorithm. (10) (U) (May 2011) (June – 2014)
13. Describe key discarding process of DES. (6) (U) (May 2011)
14. Draw the general structure of DES and explain the encryption decryption process. (U)
(May/June 2009)
15. Mention the strengths and weakness of DES algorithm. (AN) ( May/June 2009)
16. For each of the following elements of DES, indicate the comparable element in AES if available.
(A) (Nov/Dec 2017)
(i) XOR of subkey material with the input to the function.
(ii) F function.
PART A
7. Why random numbers are important for network security? (May /June 2014)
Randomness is important in cryptography to ensure secret keys are random, security against
attacks, privacy and anonymity, and to ensure unpredictability. This can only be achieved by using high
quality random numbers hard for computers to generate.
11. Give the applications of the public key cryptosystem.(U) (April/May 2019)
Public Key Cryptography is used in a number of applications and systems software. Some examples
of application of cryptography are:
• Digitally signed document
• E-mail encryption software such as PGP and MIME
13. List the four possible approaches to attack the RSA Algorithm. (R)
1. Brute Force
2. Mathematical Attacks
3. Timing attacks
4. Chosen Cipher text attacks
14. Why is trap door one way function used? (AN) (Nov/Dec 2018)
A trapdoor one way function is a function that is easy to compute in one direction, yet difficult
to compute in the opposite direction (finding its inverse) without special information, called the
"trapdoor". Trapdoor functions are widely used in cryptography.
16. State the difference between private key and public key algorithm. (R) (April/May 2017)
S.NO Private Key/ Symmetric Encryption Public Key/ Asymmetric Encryption
1 Symmetric encryption incorporates only Asymmetric Encryption consists of two
one key for encryption as well as cryptographic keys. These keys are regarded as
decryption. Public Key and Private Key.
2 Symmetric encryption is a simple Contribution from separate keys for encryption
technique compared to asymmetric and decryption makes it a rather complex
encryption as only one key is employed to process.
carry out both the operations.
17. Perform encryption for the plain text M=88 using the RSA algorithm p=17, q=11 and the
public component e=7.(A) (Nov/Dec 2017)
p = 17, q = 11, n=p * q = 187, Φ(n) = (p-1)(q-1)=160 e=7
Encryption:
C = 887mod 187 = 11
Decryption:
M = 1123mod 187 = 88
18. Give the significance of hierarchical key control. (AN) ( Nov/Dec 2017)
n = p * q = 7 * 11 = 77
f(n) = (p-1) * (q-1) = 6 * 10 = 60
Now, we need to compute d = e-1 mod f(n) by using backward substitution of GCD algorithm:
According to GCD:
60 = 17 * 3 + 9
17 = 9 * 1 + 8
9=8*1+1
8=1*8+0
Therefore, we have:
1=9–8
= 9 – (17 – 9)
= 9 – (17 – (60 – 17 * 3))
= 60 – 17*3 – (17 – 60 + 17*3)
= 60 – 17 *3 + 60 – 17*4
= 60*2 – 17*7
Hence, we get d = e-1 mod f(n) = e-1 mod 60 = -7 mod 60 = (53-60) mod 60 = 53
So, the public key is {17, 77} and the private key is {53, 77}, RSA encryption and decryption is
following:
Encryption Decryption
20. How Key distribution can take place between two parties?
1. A can select a key and physically deliver it to B.
2. A third party can select the key and physically deliver it to A and B.
3. If A and B have previously and recently used a key, one party can transmit the new key to the
other, encrypted using the old key.
4. If A and B each has an encrypted connection to a third party C, C can deliver a key on the
encrypted links to A and B.
23. What are the key concepts of man in the middle attack?
Man-in-the-middle is a type of eavesdropping attack that occurs when a malicious actor
inserts himself as a relay/proxy into a communication session between people or systems.
A MITM attack exploits the real-time processing of transactions, conversations or transfer of other
data.
Man-in-the-middle attacks allow attackers to intercept, send and receive data never meant to be for
them without either outside party knowing until it is too late.
25. State whether symmetric and asymmetric cryptographic algorithms need key echange?
(May/June 214)
Yes they need key exchange. If the cipher is a symmetric key cipher, both will need a copy of
the same key. If it is an asymmetric key cipher with the public/private key property, both will need
the other's public key.
30. Using ElGamal Scheme, let α = 5, p =11, XA= 2. Find the value of YA. (A)
α = 5, p =11, XA= 2
YA = α XAmod p
= 52 mod 11
y2 = x3 + ax + b
Or in pictorial form:
PART-B
X = 2(mod 3)
X = 3(mod 5)
X = 2(mod 7).
(b) State and prove Fermat's theorem. (8) (U) (Nov/Dec 2016)
8. State Chinese Remainder theorem and find X for the given set of congruent equations
Using CRT. (8) (A) (April/May 2017)
X = 1(mod 5)
X = 2(mod 7)
X = 3(mod 9)
X = 4(mod 11)
9. State and prove the Chinese remainder Theorem. What are the last two digits of 49 19 ? (A)
(April/May 2018)
PART A
4. Specify the requirements for message authentication. (R) (Nov/Dec 2016) (April/May 2019)
i. Disclosure.
ii. Traffic analysis.
iii. Masquerade.
iv. Content Modification.
v. Sequence Modification.
vi. Timing modification.
11. What is the role of compression function in hash function? (April/May 2017)
A compression function takes two fixed size inputs: a chaining value and a message and returns a fixed
size value. So it's essentially a hash function with fixed input size.
19. Show how SHA is more secure than MD5. (AN) (April/May 2019)
SHA is structurally similar to MD5. It is slower than MD5 but more secure, because it produces
message digests that are 25% longer than those produced by the message digest functions. Since
SHA has a longer (160 bits) hash value it is more resistant to brute force attacks than MD5.
22. Specify the various types of authentication protocol. (R) (April/May 2017)
• Kerberos authentication protocol
• NT LAN Manager (NTLM) authentication protocol
• Secure Sockets Layer/Transport Security Layer (SSL/TLS)
• Digest authentication
• Smart cards
• Virtual Private Networking (VPN) and Remote Access Services (RAS)
•
23. What is the role of compression function in hash function? (U) (April/May 2017)
A compression function takes a fixed length input and returns a shorter, fixed-length
output. Then a hash function can be defined by means of repeated applications of the
compression function until the entire message has been processed. In this process, a message of
arbitrary length is broken into blocks of a certain length which depends on the compression
function, and "padded" (for security reasons) so that the size of the message is a multiple of the
24. How is the security of a MAC function expressed? (U) (Nov/Dec 2017)
• A MAC is an authentication technique involves the use of a secret key to generate a small
fixed-size block of data, known as a cryptographic checksum or MAC. The MAC is then
appended to the message.
• Here, sender and receiver share a secret key.
• When A has to send a message to B, it calculates the MAC as a function of the message
and the key:
MAC = MAC(K, M)
where M is
plaintext C is the
MAC function
K is the secret
key and
MAC is the message authentication code.
• The message plus MAC are transmitted to the intended recipient.
• The recipient performs the same calculation on the received message, using the same
secret key, to generate a new MAC. The received MAC is compared to the calculated
MAC.
25. Mention the significance of signature function in Digital Signature Standard approach.
(R) (Nov/Dec 2017)
The Signature function assures the recipient that only the sender, with the knowledge of the
private key, could have produce the valid signature.
26. How digital signatures differ from authentication protocols? (AN) (April/May 2018)
A message authentication code (MAC) protects against message forgery by anyone who
doesn't know the secret key (shared by sender and receiver).This means that the receiver can
forge any message – thus we have both integrity and authentication , but not non-repudiation.
Also an attacker could replay earlier messages authenticated with the same key, so a protocol
should take measures against this (e.g. by including message numbers or timestamps). (Also,
in case of a two-sided conversation, make sure that either both sides have different keys, or by
another way make sure that messages from one side can't sent back by an attacker to this
side.)
MACs can be created from unkeyed hashes (e.g. with the HMAC construction), or created
directly as MAC algorithms.
A (digital) signature is created with a private key, and verified with the corresponding public
key of an asymmetric key-pair. Only the holder of the private key can create this signature,
and normally anyone knowing the public key can verify it. Digital signatures don't prevent the
replay attack mentioned previously.
27. Specify the various types of authentication protocol. (April /May 2017)
40. Write a simple authentication dialogue used in Kerberos. (U) (Nov/Dec 2017)
• where
• C= client , AS= authentication server ,V=server
• IDC= identifier of user on C ,IDV= identifier of V
• PC= password of user on C ,ADC= network address of C
• Kv= secret encryption key shared by AS and V
the user logs on to a workstation and requests access to server V.
The client module C in the user's workstation requests the user's password and then sends a message to
the AS that includes the user's ID, the server's ID, and the user's password.
The AS checks its database to see if the user has supplied the proper password for this user ID and
whether this user is permitted access to server V.
• the AS creates a ticket that contains the user's ID and network address and the server's ID.
• This ticket is encrypted using the secret key shared by the AS and this server
• This ticket is then sent back to C.
• C sends a message to V containing C's ID and the ticket.
• V decrypts the ticket and verifies that the user ID in the ticket is the same as the unencrypted
user ID in the message.
• Various code-signing schemes, such as signed Java ARchives, and Microsoft Authenticode.
• Various secure E-Mail standards, such as PEM and S/MIME.
• E-Commerce protocols, such as SET.
PART B
1. Compare the features of SHA-1 and MD-5 algorithm. (AN) (May/June 2007)
2. Discuss the objectives of HMAC and its security features. (U) (May/June 2007)
3. Discuss briefly about Digital Signature Algorithm. (U)
(May/June 2007) (Nov/Dec 2007) (May/June 2009) (May/June 2010)(June – 2014)
4. Describe the block chaining technique. (U) (Nov/Dec 2007)
5. Discuss the security of HMAC. (U) (Nov/Dec 2007)
6. What is message authentication? Explain. (R) (May/June 2009)
7. How does SHA-1 logic produce message digest? (U) (May/June 2009)
8. Illustrate SHA2 in detail. (U) (Nov/Dec 2018)
9. Explain the challenges/ response approach in mutual authentication. (U) (May/June 2009)
10. Explain digital signature standard with necessary diagrams in detail.(16) (U) (Nov/Dec
2016)(April/May 2017)
11. Describe digital signature algorithm and show how signing and verification is done using DSS.
(E) (May/June 2008) (April/May 2019)
12. Write about the symmetric encryption approach for digital signatures. (U) (May/June 2008)
13. What are the properties a hash function must satisfy? Explain. (R)
(Nov/Dec 2009) (Dec 2012, 2013)
14. Explain about any two authentication protocols. (R) (May/June 2010)
15. Discuss briefly about Secure Hash Algorithm. (U) (May/June 2010) (June 2013)
(Dec - 2013)(April/May 2016)
16. Explain the types of Digital Signatures. (R)
22. How the encryption is key generated from password in Kerberos? (U) (May/June 2007)
23. Explain Kerberos Version 4 in detail. (16) (R) (April / May 2016)
24. Discuss Client Server Mutual authentication, with example flow diagram. (16) (U)
(Nov/Dec 2016)
25. Discuss the different types of authentication procedures? (U) (Nov/Dec 2007)
26. Describe the authentication dialogue used by Kerberos for obtaining services from another realm.
(U) (May/June 2008)
27. Explain with the help of an example how a user’s certificate is obtained from another certification
authority in x509 scheme. (E) (May/June 2008)
28.(i) What is Kerberos? Explain how it provides authenticated service. ( 7) (U)
(ii) Explain the format of the X.509 certificate. (6) (U) (April/May 2019)
29. Explain Kerberos Authentication mechanism with suitable diagrams.(16) (U) (June – 2014)
30.(i) What is Kerberos? Explain how it provides authenticated service. (8) (U) (April/May 2018)
(ii) Explain the format of the X.509 certificate. (8) (R) (April/May 2018)
PART A
2. What are the services provided by PGP? (R) (April/May 2018, Nov/Dec 2018)
• Digital signature
• Message encryption
10. Mention the five headers fields defined in MME? (R) (April/May 2019)
➢ MIME version.
➢ Content type.
➢ Content transfer encoding.
➢ Content id.
➢ Content description.
16. What are the benefits of IP Security? (U) (April/May 2017, April/May 2019)
• Provide security when IP security implement in router or firewall.
• IP security is below the transport layer is transparent to the application.
• IP security transparent to end-user.
• IP security can provide security for individual user.
19. List out the steps involved in SSL record protocol. (U)
1. SSL record protocol takes application data as input and fragments it.
2. Apply lossless Compression algorithm.
3. Compute MAC for compressed data.
4. MAC and compression message is encrypted using conventional algorithm.
22. Define Intruder. (R) ) (April /May 2011) (Nov/Dec 2016) (April/May 2019)
23. List the three classes of Intruders.(R) (April /May 2011) (Nov/Dec 2016) (April/May 2019)
1. Masquerader
2. Misfeasor
3. Clandestine user
25. Discriminate statistical anomaly detection and rule based detection. (AN) (Nov/ Dec 2018)
Statistical Anomaly Detection Rule Based Detection
Involves the collection of data relating to the Involves an attempt to define a set of rules that
behavior of legitimate users over a period of can be used
time. Then statistical tests are applied to decide that a given behavior is that of an
to observed behavior to determine with a high intruder.
level of confidence whether that
behavior is not legitimate user behavior
a. Threshold detection a. Anomaly detection
b. Profile based b. Penetration identification
34. What is mean by SET? What are the features of SET? (U)
Secure Electronic Transaction (SET) is an open encryption and security specification designed
to protect credit card transaction on the internet.
Features are:
37. Define the roles of firewall. (R) (April/May 2017) (April/May 2018)
A firewall is responsible for bringing in only safe and relevant traffic to your private network
or computer system. It keeps a check on any unauthorized access to your computer and automatically
refuses and decrypt’s unwanted information through the network.
39. Distinguish between Attack and Threat. (AN) (Apr/May 2017, Nov/Dec 2018)
Parameter Attack Threat
An attack is a deliberate act that exploits Threat is anything potential that cause
Meaning
vulnerability harm to the system
• Virus – Piece of software to steal • Security threat – Data stealing,
and damage computer exploitation of data, virus attack
• Spyware – Collects information etc.
against user’s own will • Physical threat – Loss or physical
Categories • Phishing – Mostly done through damage to the system
email like fraudulent system • Internal – power supply, hardware
• Worms – Self-replicating from one fault etc.
system to another • External – lighting, natural disaster
• Spam – Spam emails are computer such as flood, earthquake
41. Specify the purpose of ID payload in phase I and Phase II inherent in ISAKMP/IKE
Encoding. (U) (April/May 2017)
43. What is the difference between TLS and SSL Security? (AN) (April/May 2018)
S.NO Concepts TLS SSL
It is little slower due to the It is faster than TLS as
1. Which is faster? two-step communication authentications are not
process i.e. handshaking and carried out intensively.
actual data transfer.
Which is complex to
It is complex as it requires It is simpler than the TLS
2. manage on the server
certificate validations and as it lacks few features that
side?
good authentications. are present in the TLS.
PART -B